{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,23]],"date-time":"2025-10-23T20:56:45Z","timestamp":1761253005343},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/ccis.2014.7175784","type":"proceedings-article","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T18:40:39Z","timestamp":1439404839000},"page":"487-490","source":"Crossref","is-referenced-by-count":1,"title":["A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography"],"prefix":"10.1109","author":[{"family":"Yiwen Nie","sequence":"first","affiliation":[]},{"family":"Wei Yang","sequence":"additional","affiliation":[]},{"family":"Liusheng Huang","sequence":"additional","affiliation":[]},{"family":"Xiaorong Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICCW.2010.5503916"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2012.2192487"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSG.2011.2160975"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5946886"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PESW.2002.985144"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/5.192069"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2010.5402673"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2007.381742"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2012.6194398"},{"journal-title":"Privacy and the New Energy Infrastructure","year":"2009","author":"quinn","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MPE.2008.931384"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SMARTGRID.2010.5622050"}],"event":{"name":"2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2014,11,27]]},"location":"Shenzhen, China","end":{"date-parts":[[2014,11,29]]}},"container-title":["2014 IEEE 3rd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7168380\/7175692\/07175784.pdf?arnumber=7175784","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,25]],"date-time":"2017-03-25T02:18:19Z","timestamp":1490408299000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7175784\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/ccis.2014.7175784","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}